Linux Security
    Linux Security
    Linux Security

    Fedora 21: arj Security Update

    Date
    141
    Posted By
    - Added patch from Debian to avoid free on invalid pointer due to a buffer overflow (#1196751, #1207180) - Added patch from Debian for symlink directory traversal (#1178824) - Added patch from Debian to fix the directory traversal via //multiple/leading/slash (#1178824)
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5603
    2015-04-05 11:04:02
    --------------------------------------------------------------------------------
    
    Name        : arj
    Product     : Fedora 21
    Version     : 3.10.22
    Release     : 22.fc21
    URL         : https://arj.sourceforge.net/
    Summary     : Archiver for .arj files
    Description :
    This package is an open source version of the arj archiver. It has
    been created with the intent to preserve maximum compatibility and
    retain the feature set of original ARJ archiver as provided by ARJ
    Software, Inc.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    - Added patch from Debian to avoid free on invalid pointer due to a buffer overflow (#1196751, #1207180)
    - Added patch from Debian for symlink directory traversal (#1178824)
    - Added patch from Debian to fix the directory traversal via //multiple/leading/slash (#1178824)
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Fri Apr  3 2015 Robert Scheck  3.10.22-22
    - Added patch from Debian to avoid free on invalid pointer due to a
      buffer overflow (#1196751, #1207180)
    - Added patch from Debian for symlink directory traversal (#1178824)
    - Added patch from Debian to fix the directory traversal via
      //multiple/leading/slash (#1178824)
    * Sat Feb 21 2015 Till Maas  - 3.10.22-21
    - Rebuilt for Fedora 23 Change
      https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1178824 - CVE-2015-0556 CVE-2015-0557 arj: two directory traversal flaws
            https://bugzilla.redhat.com/show_bug.cgi?id=1178824
      [ 2 ] Bug #1207180 - CVE-2015-2782 arj: free on invalid pointer due to to buffer overflow
            https://bugzilla.redhat.com/show_bug.cgi?id=1207180
      [ 3 ] Bug #1196751 - arj: buffer overflow write access initiated by a size read from a crafted archive
            https://bugzilla.redhat.com/show_bug.cgi?id=1196751
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update arj' at the command line.
    For more information, refer to "Managing Software with yum",
    available at https://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.